DO NOT ROUTE REGULAR TRAFFIC OVER TOR TRANSPARENTLY<p>Sorry for the uppercase, but transparent proxies are dangerous, *especially* if users are not aware of them.<p>Applications that are not explicitly designed to use Tor can often leak data or be vulnerable to malicious exit nodes.<p>Also, this pattern can create false sense of security.<p>See warnings:<p><a href="https://gitlab.torproject.org/legacy/trac/-/wikis/doc/TransparentProxy#warning" rel="nofollow">https://gitlab.torproject.org/legacy/trac/-/wikis/doc/Transp...</a>
It's commendable that the project states "anonymity is hard to get – solely using Tor doesn’t guarantee it" and "it is strongly advised not to use TorBox if your well-being depends on your anonymity". Other such solutions like to gloss over the fact that "using tor !== anonymity" and even the Tor Browser does a lot more to help with anonymity than just route your traffic through tor.<p>I'm still not sure where such a solution would be a good choice though. Getting access to the broader, uncensored internet is also not as easy as it seems in countries where this applies, e.g. China, as even getting an entry node that works is not easy so this is not a plug'n'play option anymore for that.
After a short moment of outrage I saw the important and required notice not too deep in the project description:<p>> [...] it is strongly advised not to use TorBox if your well-being depends on your anonymity. In such a situation, it is advisable to use Tails [...]<p>My advice for anyone considering this kind of setup (tunneling blindly a set of clients through tor) would be to 1) make sure they understand the limitations of the approach, especially when clients behave "normally" (a.k.a. actively leaking identifying information) while sharing a circuit and 2) have a look at the considerations that projects like the tor browser or tails are focusing on in order to measure how fragile tor "anonymity" features are.<p>I feel it's useful to insist on it: DON'T RELY ON THIS KIND OF SETUP FOR CRITICAL OPS.<p>Besides these warnings, I have a hard time figuring a sensible use case for this (I may lack imagination though). One useful (but unrelated, from what I got from my quick glance on TFA) feature of tor that I enjoy and that is orthogonal to its "anonymity" features is the ease of exposing an onion service (reverse tunnel like) from inside a firewall'd/NAT'd network.
Can I just order one of these? I never even glued the raspberri pi and fan and case together to even get to the point of loading this, and this package is supposed to be the convenience<p>I just want the tiny computer router out the box loading this<p>anybody have that?